Date: Tue, 20 Feb 2001 22:39:57 -0800 (PST) From: Robert Watson <rwatson@FreeBSD.org> To: cvs-committers@FreeBSD.org, cvs-all@FreeBSD.org Subject: cvs commit: src/sys/compat/linprocfs linprocfs_misc.c src/sys/compat/linux linux_mib.c src/sys/compat/svr4 svr4_misc.c src/sys/kern init_main.c kern_exit.c kern_fork.c kern_jail.c kern_ktrace.c kern_mib.c kern_proc.c kern_prot.c sysv_msg.c sysv_sem.c ... Message-ID: <200102210639.f1L6dvw85339@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
rwatson 2001/02/20 22:39:57 PST Modified files: sys/compat/linprocfs linprocfs_misc.c sys/compat/linux linux_mib.c sys/compat/svr4 svr4_misc.c sys/kern init_main.c kern_exit.c kern_fork.c kern_jail.c kern_ktrace.c kern_mib.c kern_proc.c kern_prot.c sysv_msg.c sysv_sem.c sysv_shm.c tty_pty.c uipc_socket.c uipc_usrreq.c vfs_syscalls.c sys/miscfs/procfs procfs_status.c sys/net if.c if.h rtsock.c sys/netinet in.h in_pcb.c tcp_usrreq.c udp_usrreq.c sys/sys capability.h jail.h proc.h systm.h ucred.h Log: o Move per-process jail pointer (p->pr_prison) to inside of the subject credential structure, ucred (cr->cr_prison). o Allow jail inheritence to be a function of credential inheritence. o Abstract prison structure reference counting behind pr_hold() and pr_free(), invoked by the similarly named credential reference management functions, removing this code from per-ABI fork/exit code. o Modify various jail() functions to use struct ucred arguments instead of struct proc arguments. o Introduce jailed() function to determine if a credential is jailed, rather than directly checking pointers all over the place. o Convert PRISON_CHECK() macro to prison_check() function. o Move jail() function prototypes to jail.h. o Emulate the P_JAILED flag in fill_kinfo_proc() and no longer set the flag in the process flags field itself. o Eliminate that "const" qualifier from suser/p_can/etc to reflect mutex use. Notes: o Some further cleanup of the linux/jail code is still required. o It's now possible to consider resolving some of the process vs credential based permission checking confusion in the socket code. o Mutex protection of struct prison is still not present, and is required to protect the reference count plus some fields in the structure. Reviewed by: freebsd-arch Obtained from: TrustedBSD Project Revision Changes Path 1.20 +2 -2 src/sys/compat/linprocfs/linprocfs_misc.c 1.10 +7 -6 src/sys/compat/linux/linux_mib.c 1.25 +1 -10 src/sys/compat/svr4/svr4_misc.c 1.157 +2 -4 src/sys/kern/init_main.c 1.118 +1 -10 src/sys/kern/kern_exit.c 1.100 +1 -6 src/sys/kern/kern_fork.c 1.10 +68 -19 src/sys/kern/kern_jail.c 1.49 +4 -2 src/sys/kern/kern_ktrace.c 1.39 +4 -4 src/sys/kern/kern_mib.c 1.87 +5 -1 src/sys/kern/kern_proc.c 1.75 +30 -19 src/sys/kern/kern_prot.c 1.30 +6 -6 src/sys/kern/sysv_msg.c 1.32 +5 -5 src/sys/kern/sysv_sem.c 1.53 +7 -7 src/sys/kern/sysv_shm.c 1.84 +3 -3 src/sys/kern/tty_pty.c 1.90 +2 -2 src/sys/kern/uipc_socket.c 1.63 +3 -2 src/sys/kern/uipc_usrreq.c 1.178 +3 -2 src/sys/kern/vfs_syscalls.c 1.27 +3 -3 src/sys/miscfs/procfs/procfs_status.c 1.103 +4 -2 src/sys/net/if.c 1.61 +1 -3 src/sys/net/if.h 1.51 +4 -2 src/sys/net/rtsock.c 1.53 +1 -4 src/sys/netinet/in.h 1.77 +11 -10 src/sys/netinet/in_pcb.c 1.54 +5 -2 src/sys/netinet/tcp_usrreq.c 1.85 +6 -3 src/sys/netinet/udp_usrreq.c 1.5 +2 -2 src/sys/sys/capability.h 1.11 +18 -2 src/sys/sys/jail.h 1.152 +2 -3 src/sys/sys/proc.h 1.135 +3 -4 src/sys/sys/systm.h 1.21 +2 -1 src/sys/sys/ucred.h To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe cvs-all" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200102210639.f1L6dvw85339>